Ethical Hacking Methodology
Ethical Hacking known as white-hat hacker or penetration testing or vulnerable assessment. What make it different from hackers, ethical hacking have structured approach and approved by company/victim.
The Five Structure Approach
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Reconnaissance
Any move or step taken where all information being gathered.
Using passive information gathering
No triggered.
Scanning
Start active information gathering
Focus on discover any loop hole (vulnerabilities, services or open ports).
To identify potention weakness.
Gaining Access
Attempt to gain access to target.
Focus on vulnerability found in scanning method.
Maintaining Access
Maintain access in target system.
Install backdoor or remote access
Covering Track
Remove any traces or action.
Leaving no evidence.
Last updated